General
-
Target
c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2
-
Size
3.4MB
-
Sample
230129-y7bflsca77
-
MD5
a75a69c8e7d43c798214ecfe57397224
-
SHA1
5eea407838965192b0785ae08e7c7b4dbf900e33
-
SHA256
c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2
-
SHA512
13cfcacf1c0fe8cb80a775394720fc1f77c14e36d187356ff9d60a37bd1cf0ff14f2a85780437981db5b1411218a1dbd85f93f4b1053d9196679a7d149949d5a
-
SSDEEP
49152:WelMheDwmXQVKk2rBkyD3RZDaCAxQs8VlIiWSk8hM0wGUsfisgEWmBMbLCDrYGE5:7L8ArGoaCls8VlIkkgMlGUkMqoX
Behavioral task
behavioral1
Sample
c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2
-
Size
3.4MB
-
MD5
a75a69c8e7d43c798214ecfe57397224
-
SHA1
5eea407838965192b0785ae08e7c7b4dbf900e33
-
SHA256
c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2
-
SHA512
13cfcacf1c0fe8cb80a775394720fc1f77c14e36d187356ff9d60a37bd1cf0ff14f2a85780437981db5b1411218a1dbd85f93f4b1053d9196679a7d149949d5a
-
SSDEEP
49152:WelMheDwmXQVKk2rBkyD3RZDaCAxQs8VlIiWSk8hM0wGUsfisgEWmBMbLCDrYGE5:7L8ArGoaCls8VlIkkgMlGUkMqoX
Score10/10-
StormKitty payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-